Analyst, Global Incident Response

Analyst, Global Incident Response

Full-Time 40000 - 50000 € / year (est.) No home office possible
Transunion

At a Glance

  • Tasks: Join our Global Incident Response team to support clients with digital forensics and incident response.
  • Company: TransUnion, a leading credit reference agency with a focus on innovation.
  • Benefits: Enjoy 26 days of annual leave, wellness days, private healthcare, and a generous pension scheme.
  • Other info: Flexible working arrangements available; we value diversity and inclusion.
  • Why this job: Make a real impact in cybersecurity while growing your skills in a supportive environment.
  • Qualifications: Bachelor’s degree in cybersecurity or related field; experience in incident response preferred.

The predicted salary is between 40000 - 50000 € per year.

TransUnion is a major credit reference agency, offering specialist services in fraud, identity and risk management, automated decisioning and demographics. We support organisations across various sectors including finance, retail, telecommunications, utilities, gaming, government and insurance.

We’re looking for an Analyst, Global Incident Response to join our growing Global Incident Response team. The role is account and client focused, supporting the growth of our global Digital Forensics and Incident Response (DFIR) and overall IR efforts. This role focuses on servicing and growing accounts through expertise in DFIR operations, data security, privacy compliance, project management, account management and document drafting.

The ideal candidate should have at minimum, entry level knowledge of DFIR operations, threat intelligence, MITRE, privacy compliance principles and requirements, insurance, and basic data breach notification principles.

Day to Day You’ll Be:

  • Conducting scoping/consultation calls with clients, partners and their staff, including other stakeholders.
  • Drafting scoping/proposal documentation and supporting contractual processes.
  • Rapidly and accurately responding to partner or client needs and requests, including requests for proposal, pricing quotes, and contracts as well as activities that expand existing relationships with partners.
  • Managing assigned case load with minimal assistance/manage entire sales process and oversee delivery.
  • Utilizing data collections tools, EDR, forensic tools, threat intelligence and dark web scrapping/search tools, APIs and other available tools to support DFIR engagements.
  • Supporting Threat Actor engagements.
  • Extracting, reviewing and analysing log data.
  • Assisting in drafting of case work product such as forensic reports.
  • Assisting the overall team through the life cycle of cases.
  • Ensuring client satisfaction, engagement, and success to support retention.
  • Communicating technical report findings and recommendations internally and with clients regarding identified forensic investigation evidence, vulnerabilities, data exposure and general risks.
  • Assisting in current and future ongoing improvements to processes, tooling, including research on current trends and issues in the field.
  • Working alongside the business development team with delivery of account management tasks such as client reporting, contracting, and quarterly account reviews.
  • Utilizing key systems to accurately report insights and analyse operational and market trends in support of the business development team.

Essential Skills & Experience:

  • Bachelor’s degree in cybersecurity, digital forensics, or technology related field. Exceptional related experience may be accepted in lieu of degree.
  • Track record years of experience with incident response, project management, and legal compliance experience preferred.
  • Track record years of experience in account management or inside sales communicating with all levels of the buying organization preferred.
  • Able to work flexible hours, conduct consultations and draft initial case documentation outside of banking hours.
  • Experience with EDR tools such as SentinelOne, CrowdStrike, Huntress, etc.
  • Experience with Data mining tools such as Canopy preferred.
  • Industry knowledge around insurance, cyber security, identity protection and/or government contract experience.
  • Experience of managing complex processes to fulfilment.
  • JD or Master’s in cybersecurity a plus.
  • CISSP, CISM, CIPP (or CISA with a focus on privacy and security) certifications are a plus.
  • Well-developed communication and listening skills; able to analyse partner or client needs quickly and effectively.
  • Highly professional, self-driven who can manage multiple priorities with verbal and visual presentation skills.
  • Up to 10% travel. Additional language fluency is desirable.

What’s In It For You?

At TransUnion you will be joining a friendly, forward-thinking global business. As well as an excellent salary and bonus scheme or commission scheme (if joining our sales teams), our benefits package includes:

  • 26 days’ annual leave + bank holidays (increasing with service)
  • Global paid wellness days off + a bonus day off to celebrate your birthday
  • A generous contributory pension scheme + access to the TransUnion Employee Stock Purchase Plan
  • Private health care + a variety of physical, mental and financial fitness wellbeing programmes such as access to mindfulness tools
  • Access to our diversity forums and communities so you can get involved in causes close to your heart

Flexibility at TU:

We recognise that our people need the freedom to balance their day-to-day lives with their work. This is why we’ve set out to create inclusive and flexible policies and practices for you to accommodate all your responsibilities and needs: children, family and beyond. If the role is advertised as full time, don’t let this stop you from applying. Let us know if you’re looking for a part-time or flexible working arrangement and we can discuss this with you.

Additional Support:

At TransUnion, we’re committed to fostering an inclusive and diverse workplace where all individual’s talents and perspectives are valued. When you apply for a position with us, you’re not just joining a team, you’re becoming part of a community that celebrates differences and embraces equality. We understand that everyone has different needs, which is why we offer a range of reasonable adjustments to our recruitment process.

Interview & Hiring Process:

Most of our recruitment processes are virtual, so you’ll get to know our hiring managers and teams over the phone and through video. If we need you to attend a physical in-person interview your recruiter will inform you of this. We do not accept any unsolicited CVs from recruitment agencies.

This is a remote position which may require occasional in-person attendance at work-related events at the discretion of management.

Analyst, Global Incident Response employer: Transunion

TransUnion is an exceptional employer that prioritises employee growth and well-being, offering a comprehensive benefits package including generous annual leave, wellness days, and a contributory pension scheme. With a commitment to flexibility and inclusivity, employees can enjoy a supportive work culture that encourages professional development and embraces diverse perspectives, making it an ideal place for those seeking meaningful and rewarding careers in the cybersecurity field.

Transunion

Contact Detail:

Transunion Recruiting Team

StudySmarter Expert Advice🤫

We think this is how you could land Analyst, Global Incident Response

Tip Number 1

Get to know the company inside out! Research TransUnion's values, recent projects, and their approach to incident response. This will help you tailor your conversations and show that you're genuinely interested in being part of the team.

Tip Number 2

Practice your pitch! Be ready to explain how your skills in DFIR operations and account management can benefit TransUnion. Keep it concise and focus on how you can contribute to their goals.

Tip Number 3

Network like a pro! Connect with current employees on LinkedIn or attend industry events. Building relationships can give you insider info and might even lead to a referral!

Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re serious about joining the TransUnion family.

We think you need these skills to ace Analyst, Global Incident Response

Digital Forensics
Incident Response (DFIR)
Data Security
Privacy Compliance
Project Management
Account Management
Document Drafting

Some tips for your application 🫡

Tailor Your Application:Make sure to customise your CV and cover letter for the Analyst, Global Incident Response role. Highlight your experience in DFIR operations and any relevant skills that match the job description. We want to see how you fit into our team!

Showcase Your Skills:Don’t just list your qualifications; demonstrate how your skills in project management, data security, and client communication can benefit us at TransUnion. Use specific examples to illustrate your expertise and make your application stand out.

Be Clear and Concise:When drafting your application, keep it straightforward and to the point. We appreciate clarity, so avoid jargon and ensure your key points shine through. This will help us quickly understand your fit for the role.

Apply Through Our Website:We encourage you to submit your application directly through our website. This way, you’ll ensure it reaches the right people and you’ll have access to all the latest updates about your application status. Let’s get started on this journey together!

How to prepare for a job interview at Transunion

Know Your DFIR Basics

Make sure you brush up on your knowledge of Digital Forensics and Incident Response (DFIR) operations. Familiarise yourself with key concepts like threat intelligence and privacy compliance principles, as these will likely come up during the interview.

Prepare for Client Scenarios

Since this role involves client interaction, think about how you would handle various client scenarios. Prepare examples of how you've managed client relationships or resolved issues in the past to demonstrate your account management skills.

Showcase Your Technical Skills

Be ready to discuss your experience with EDR tools and data mining tools. If you've used specific tools like SentinelOne or CrowdStrike, mention them and explain how they contributed to your previous work in incident response.

Ask Insightful Questions

At the end of the interview, don’t forget to ask questions! Inquire about the team dynamics, ongoing projects, or how success is measured in this role. This shows your genuine interest and helps you assess if the company is the right fit for you.